Professional Documents
Culture Documents
By
F17/1438/2011
Project report submitted in partial fulfillment of the requirement for the award
of the degree of
FACULTY/SCHOOL/INSTITUTE: Engineering
1. I understand what plagiarism is and I am aware of the university policy in this regard.
2. I declare that this final year project report is my original work and has not been
submitted elsewhere for examination, award of a degree or publication. Where other
peoples work or my own work has been used, this has properly been acknowledged and
referenced in accordance with the University of Nairobis requirements.
3. I have not sought or used the services of any professional agencies to produce this work.
4. I have not allowed, and shall not allow anyone to copy my work with the intention of
passing it off as his/her own work.
5. I understand that any false claim in respect of this work shall result in disciplinary action,
in accordance with University anti-plagiarism policy.
Signature:
Date:5/13/16
i
DEDICATION
ii
CERTIFICATION
This report has been submitted to the Department of Electrical and Information Engineering,
University of Nairobi with my approval as supervisor:
..
Dr. V. Dharmadhikary
Date..
iii
ACKNOWLEDGEMENTS
I would like to thank the Almighty God for giving me strength and wisdom throughout this
project.
I would also like to extend my sincere gratitude to my supervisor, Dr. V. Dharmadhikary for
his guidance when I was undertaking this project. My sincere gratitude to Mr. Gevirah Otieno
for his insightful and challenging ideas and the technical staff of the Department of Electrical
and Information Engineering for their guidance in this work.
I would like to acknowledge my friend and classmate, Rajab Said for his motivation and
challenging ideas to think without the box.
To my classmates whom we spent hours brainstorming for ideas, I am very grateful for your
efforts.
iv
TABLE OF CONTENTS
DECLARATION OF ORIGINALITY ....................................................................................
DEDICATION ...................................................................................................................... II
CERTIFICATION ................................................................................................................III
ACKNOWLEDGEMENTS ................................................................................................ IV
TABLE OF FIGURES........................................................................................................ VII
ABSTRACT ...................................................................................................................... VIII
CHAPTER 3: DESIGN............................................................................................................ 16
v
4.1 SIMULATION RESULTS .................................................................................................... 23
4.2 PRACTICAL RESULTS ...................................................................................................... 24
REFERENCES ........................................................................................................................ 29
BIBLIOGRAPHY .................................................................................................................... 30
APPENDICES ......................................................................................................................... 31
A: DATASHEETS ................................................................................................................... 31
B: PROJECT COST ANALYSIS ................................................................................................ 42
C: PCB LAYOUT .................................................................................................................. 42
vi
TABLE OF FIGURES
FIG 2.1: MAGNETIC COUPLING TEST SET-UP ................................................................................ 5
FIG 2.2: COMBINED AUDIO AND RF SET-UP ................................................................................ 6
FIG 2.3: COMBINED AUDIO AND RF BLOCK DIAGRAM ................................................................ 6
FIG 2.4: RESULTS ........................................................................................................................ 7
FIG 2.5: SETTING UP SCREEN ....................................................................................................... 8
FIG 2.6: WOLFHOUND PRO CELLPHONE DETECTOR...................................................................... 8
FIG 2.7: WOLFHOUND PRO PC SOFTWARE.................................................................................... 9
FIG 2.8: MANTA RAY CELLPHONE DETECTOR............................................................................. 10
FIG 2.9: BLOCK DIAGRAM ......................................................................................................... 11
FIG 2.10: LCD INTEGRATION .................................................................................................... 11
FIG 2.11: CELLPHONE DETECTOR TYPICAL CIRCUIT .................................................................. 12
FIG 2.12: CELLPHONE DETECTOR WITH FREQUENCY DOWN CONVERTER ................................... 12
FIG 2.13: CELLPHONE JAMMER IN A CELL ................................................................................. 14
FIG 4.2: DETECTOR OUTPUT WHEN CELL PHONE IS NOT IN USE ................................................. 24
FIG 4.3: DETECTOR OUTPUT WHEN CELL PHONE IS IN USE ......................................................... 25
FIG 4.4: DETECTOR OUTPUT WHEN CELL PHONE IS IN USE ......................................................... 26
FIG 4.5: OUTPUT AT LED.......................................................................................................... 27
Table 1: Project cost.....................................................................................................42
vii
ABSTRACT
Cell phones are widely used in the world. While people have to be connected to one
another, there are situations or places where there usage is to be prohibited either due to
security reasons or it may cause health hazards.
Cell phone detection has been on investigation for a long time. There are techniques
which have been formulated or proposed on how cell phones can be detected. Most of
them use the features such as audio system, RF system and common materials of the
phones and try to look into how they can be used as basis to detect mobile phones.
This project utilizes the RF system of the cell phone as the feature to be used to detect its
presence. A circuit that detects signals of the range 0.9GHz to 3GHz is used to detect a
cell phone when in use. When the signal is detected, an LED blinks to indicate the usage
of a cell phone within a radius of 1.5 metres.
viii
Chapter 1
Introduction
1.1 Background
Cell phones have become an integral part of peoples lives. They are not only used for
communication via short messaging service (SMS), calls, emails and internet but advanced
applications such as remote health monitoring systems and security systems have been
integrated with mobile phones.
The recent years have seen rapid advancements in the value addition applications in mobile
phones such as high definition cameras and high speed internet connectivity. The country has
also experienced developments in the infrastructures to support the rising need of faster
internet connectivity. Safaricom rolled out their 4G internet infrastructure which is now
available in over thirteen towns in the country.
Despite the advantages enjoyed by these advancements in mobile technology, there are
threats that have been posed by their usage. Company data mining has been a big threat in the
industry where employees are able to access sensitive company information and share with
the competitors. This led to the development of cell phone jammers where signal reception is
completely blocked when you enter the premises. Despite personal privacy invaded by the
usage of such devices, this could not put to an end the vice since mobile phones could be
connected to the computer and information transferred and sent when the employee is out of
the company premises. Criminal activities and attempted escape incidences have been
organized by inmates in correctional institutions through the use of mobile phones in such
facilities. The most common incidence in the country is when people were conned by inmates
who impersonated promoters and required winners to send money as fees to facilitate the
award of prizes. Life support machines are also sensitive to the use of mobile phones. The use
of mobile phones in such a facility leads to adverse repercussions to the life of persons whose
lives depend on the proper functionality of the machines. Other places are aeroplanes, petrol
stations, conference halls, examination halls, worship centers, etc. where the use of mobile
phones can either lead to failure of sensitive machines or is a nuisance.
1
It is therefore a reality that mobile usage is some places must be prohibited. Due to the
privacy laws that limit the use of cell phone jammers, cell phone detectors must be designed
and installed so that in case a person gets in with a phone into such places, they can be
notified and either told to switch them off or take them outside. The effectiveness of cell
phone detectors is that they continually scan for the presence and usage of the cell phone and
sound an alarm to notify the user or security personnel.
Due to this problem that has been experienced in the university for years, there is a need to
design a system that can detect the presence and usage of mobile phones in the examination
halls. This project is therefore aimed towards designing a cell phone detector that will be
installed in the examination venues. This will curb the vice because even though some may
manage to smuggle them into the halls, their usage and presence are continuously monitored
by the system and offenders can be caught.
This detector is not limited for use in examination halls only. It may be used in hospitals,
conference halls, correctional institutions and other places where the use of mobile phones
must be prohibited.
2
1.4 Main Objectives
The main objectives of this project are to:
(i). Design a circuit that can detect signals in the range of 0.9GHz to 3GHz within a
radius of one and a half metres.
(ii).Produce a notification when the signals in the range of 0.9 GHz to 3 GHz are detected.
3
Chapter 2
Literature Review
Exploring the features of most cell phones show that they have a microprocessor, a read only
memory (ROM) that provides a storage for the operating system, a random access memory
(RAM) that temporarily provides storage for data when the cell phone is powered, a radio
module, a digital signal processor, a microphone, a speaker, a variety of hardware keys and
interface and a liquid crystal display (LCD) [1].
A focus to detect mobile phones has therefore to focus on these features to determine the
potential vulnerability as entry points. Tests were carried at Pacific Northwest National
Laboratories (USA) to determine the potential vulnerability of the microphone, speaker and
RF system as entry points for detection.
The second part of the experiment was carried out to detect the cell phone by detecting the
RF transmitted. This was done by the use of an RF signal strength meter, an amplifier, a
mixer and a filter. They found out that since the mobile phone keeps a continuous
communication with the tower, this technique was successful.
4
2.1.2 Combined Audio and RF Signals
The combined audio and RF signal tests were done by carrying out a magnetic coupling test.
In this test a frequency synthesizer was used to drive one coil at 28MHz and a spectrum
analyzer used to monitor the output of the second coil. The cell phones presence or position
relative to either coil made no change in the observed signal from the second coil.
A modification was made that incorporated an audio speaker to make the cell phones
microphone or speakers react to the audio signal with an RF spectrum analyzer configured to
demodulate AM signals.
5
Fig 2.2: Combined Audio and RF set-up
A block diagram of the setup is in fig 2.3 below. The RF transmitter and receiver was to be
used to sense cell phone when reacting to the audio signal.
The results obtained from the test were encouraging but the cell phone was found not to
respond when it was shielded.
6
Fig 2.4: Results
7
Fig 2.5: Setting up screen
The detector can detect phones in standby mode. The registration varies with base stations
with phones registering once every few minutes up to 20 minutes. This time varies greatly
based upon carriers, distance from base station and individual cell phone manufacturers
standards.
8
It had a dynamic range of 60dB and a bandwidth resolution of 2MHz. This detector has a
threshold setting and comes with optional PC software which receives data from the detector
via a mini USB port allowing real time monitoring, generation and printing of reports, and
saves logs into an SQL database.
The price of a piece of this device goes for $2,400.00 according to their website.
9
Fig 2.8: manta ray cellphone detector
The unique technology that uses is that it scans for specific components common to all cell
phones and not just metal. This way it reduces false triggers like coins, belt buckles, keys,
watches and other common metal items that may trigger a standard metal detector.
From the manufacturers promotion video, it shows this detector can detect cell phones even
when they are concealed behind bricks and concrete. Furthermore, it can work both in
handheld mode and stationary mode.
10
Nokia cell phone had distinct signal at 245MHz.
In this detection approach, a passive circuit listens for any emissions from a cellular phone
when it is either waiting for a call or transmitting and does not require an external signal to
detect the phone. This is advantageous especially in areas where power emissions from
electromagnetic sources are highly prohibited.
The circuit implementation of this approach differs in so many ways. One of the approaches
is in fig 2.9 as a block diagram.[3]
11
Fig 2.11: Cellphone detector typical circuit
The second proposed approach using this detection technique is the use a frequency down
converter with a band pass filter [4].
12
The RF spectrum measurement approach had shortcomings. The iPhone propagation range
could not be detected. Another highlighted shortcoming is that even in the absence of a
cellphone, signals could still be detected. The proposed solution to this problem was to design
a circuit that masked the signals detected in the absence of a cell phone. It was proposed that
a passive infrared detector be included in the system to detect the presence of a person at the
entrance to a limited area. Its function will be to cause the Cell Phone Detector to transition
from measurement of the background signals into the cell phone detector mode.
The person interested in detecting the phone is usually not concerned with the exact location
but only the fact that there is no communication via the phone. Parties can therefore enter the
locality with the devices but cannot use them for calls, emails, bluetooth or SMS provided the
jamming device propagates at the frequency these services use.
The devices that jam frequencies consist of the following parts in the circuitry:
Voltage controlled oscillator (VCO): The VCO generate the frequency at which the cell
phone transmit and therefore interfere with the communication.
Tuning circuit: This circuit controls the frequency at which the jammer broadcasts its
signal by sending a particular voltage to the oscillator.
Noise generator: It produces random electronic output in a specified frequency range to
jam the cell-phone network signal. It can be part of the tuning circuit.
RF amplification: This is the stage where the gain is provided. It boosts the power of the
radio frequency output to higher levels that are enough to jam a signal from the mobile
phone.
13
Fig 2.13: Cellphone jammer in a cell
This type of detection has been in use in movie theatres, correctional institutions and in the
military to name but a few. Some of the jammers can be tuned in to different frequencies and
therefore can be used to block specific devices only. They can be handheld or installed in
buildings or any other places where they need to block the mobile phones.
The disadvantage of this technique is that cell phones in the jammed locality can still be used
for other services such as data mining which pose a very big problem in companies. In the
case of examination halls, the phone smuggled can be used in examination irregularities
14
despite having a jammer in the hall. This method therefore proves to be ineffective in cases
where cell phone usage is prohibited.
15
Chapter 3
Design
3.1 Implementation Design
Among the detection techniques described in Section 2.3, the RF spectrum approach was
selected for implementation. The choice of this selection was based on the ease of
implementation due to readily availability of the discrete components required in the local
market. The most effective method is the implementation using voltage controlled oscillator
(VCO), frequency down-converter and a band pass filter. However, due to the unavailability
of the components required in the local market, the method could not be implemented within
the timeline of this project.
16
is inspected [7].
The loop antenna consists of a 0.22uF ceramic capacitor with it leads fixed at 18mm long and
8mm wide. These dimensions fixed provide an area sufficient to capture the frequency
required. Hence, it is a loop antenna. When there is no signal detected, the capacitor charges
and stores energy. When a field created by the presence of a mobile phone is detected, the
energy balance in the capacitor is perturbed. A displacement current is injected into the
capacitor leads generating a magnetic field hence inductance in the leads. The inductance
together with the capacitance acts as a transmission line that transmits the current to the
current to voltage converter.
When .
From fig 3.2, the 0.22uF capacitor which acts as a loop antenna is connected across the non-
inverting and inverting terminals of the operational amplifier. The capacitor stores energy and
in the absence of a mobile phone, both the positive and negative terminals receive the same
voltage, that is equal to hence the output of the operational amplifier is low.
When a mobile phone is radiating and its frequency is sensed by capacitor C1, the balance
between the inverting and non-inverting terminals of the operational amplifier is perturbed.
The current is transmitted to the non-inverting terminal and a voltage is sensed at the output.
The 100uF electrolytic capacitor (C2) connected to the non-inverting terminal ensures
stability of the terminal and fast output swing. The capacitor charges during operation and to
bring it back to stable condition, the 100K resistor (R3) provides a discharge path.
The feedback resistor is not for amplification but provides feedback to the inverting terminal
such that when the output goes high, the state is also fed back to the inverting terminal
making it high. However, since the frequency of the radiation from the mobile phone is
pulsating, the sensing capacitor C1 (loop antenna) oscillates hence the output.
3.4 Amplifier
Since the voltage at the output is small, it needs to be amplified in order to drive the
notification devices (LED or sound buzzer). At standby mode of the cell phone the voltage
output from the current to voltage converter can be as low as 10mV. Therefore an amplifier
that has little or no offsets voltage level is required. The best amplifier is a two stage
transistor based. An op amp based would suffer from offset voltages hence not effective in
this design. With a low voltage of this order it is hard to eliminate the effects of noise due to
the sensitive tuning of the amplifier.
18
Fig 3.3: Amplifier
The 10uF input coupling capacitor blocks any dc voltages at the input. The biasing used is the
collector-feedback bias. The advantage of this bias design in RF operation is that it provides
temperature stabilization such that as the temperature increases, the transistor starts to
conduct more current from emitter to collector. Since the base resistor is directly connected to
the collector, any rise in Ic will permit more voltage to drop across the collector resistor. This
will force less voltage to be dropped across the base resistor hence IB decreases consequently
Ic.:
The bypass capacitor at the emitter bypasses the RF signal around the emitter resistor to
avoid excessive RF gain degeneration in the circuit [8].
C4 (0.1uF) was connected between the base and emitter of the transistor in the final stage to
ensure that it provides fast switching of the transistor.
Bias Analysis
The bias of the circuit was analysis by determining the DC operating points of the circuit.
The requirements in a design is to make
19
which is satisfied in this circuit. The minimum collector current of the transistor is
10mA. The operating point was set at about 20mA for both amplification stages. Figure 3.
and figure 3. show the BJT analysis for stage one and two respectively.
20
Fig 3.6: BJT 2 Analysis
The amplifier was therefore design as stated above with all the operating point as defined.
The final stage which is the notification stage was integrated with the amplifier. The chosen
notification in the design was an LED. The LED was connected to the emitter of the last
transistor of the final amplification stage. The operating point of the voltage at the emitter
was held at about 3.0V to ensure that a small variation of the voltage due to voltage swing
from the current to voltage converter would make the LED to blink.
22
Chapter 4
The amplifier was simulated. In place of the current to voltage converter, a signal generator
was used. The amplifier was simulated at 50mV pk voltage and the voltage waveforms at the
LED monitored.
24
Fig 4.3: Detector output when cell phone is in use
25
Fig 4.4: Detector output when cell phone is in use
The difference in the output waveforms of fig 4.3 and fig 4.4 is because of the difference in
the vertical v/div setting in the figures.
At the output of the cell phone detector circuit, an LED was used. The practical waveform
obtained is in figure 4.5.
26
Fig 4.5: Output at LED
This output waveform made the LED to blink indicating that a cell phone was in use.
27
Chapter 5
5.1 Conclusion
The results as obtained from fig 4.2 through fig 4.4 show that the cell phone detector worked
sufficiently. The detector could detect the signal in the frequency range of 0.9GHz to 3.0
GHz thus a cell phone that is in use. This phone usage was indicated by the blinking of the
LED. When a cell phone is on standby mode, it keeps a radio silence therefore cannot be
detected using this cell phone detector. It can be concluded that the project was successful.
This detector can therefore be used to track the usage of a cell phone in an examination room
where a buzzer usage will be too loud and disturb the examiners.
28
References
[1] RM Pratt et al., "Cell Phone Detection Techniques," TN, Prepared for the US Department
of Energy October 2007.
[2] Berkeley Varitronics Systems, Inc. (2016, March) Wolfhound-PRO Cell Phone Detector.
[Online]. https://www.bvsystems.com/products/
[3] Deshpande Tamvi and Jadhav Nakul, "Active Cell phone detection and Display using
Atmega-8 Microcontroller," IMPACT: International Journal of Research in Engineering
& Technology (IMPACT: IJRET), vol. 3, no. 8, pp. 21-24, August 2015.
[5] HowStuffWorks. (2005, January) How Cell Phone Jammers Work. [Online].
http://www.electronics.howstuffworks.com/cell-phone-jammer.htm
[7] Pieter L.D. Abriel, Design of RF and Microwave Amplifiers and Oscillators, 2nd ed. MA,
Norwood: Artech House, 2009.
29
Bibliography
ElectroSchematics. Mobile Bug Circuit. [Online], www.electroschematics.com/1035/mobile-
bug-detector-sniffer Accessed: 12th Jan 2016.
Theodore S., Cellular Radio and Personal Communication: Selected Readings, Piscataway,
USA: IEEE, 1994.
Texas Instruments, "HF Antenna Design Notes: Technical Application Report," Literature
Number: 11-08-26-003, Radio Frequency Identification Systems, September 2003.
M. Sucharitha et al., "An Optimal Detection Technique for Mobile Radio Frequencies,"
IJMIE: International Journal of Management, IT & Engineering, vol. 2, Issue 5, pp. 244-256,
May 2012.
Du Hong, Zhu Dali, and Sun Degang, "New Solutions For Cell Phone Detection," in
Proceedings of the First International Conference on the Digital Society: IEEE, Beijing,
2007.
Sedra A.S. and Smith K.C., Microelectronic Circuits: Theory and Applications, 5th ed. New
Delhi, India: OUP, 2009.
30
Appendices
A: Datasheets
31
32
33
34
35
36
37
38
39
40
41
B: Project Cost Analysis
C: PCB Layout
42